Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
GLOBAL KNOWLEDGE CYBERSECURITY LEARNING SOLUTIONS AND CERTIFICATIONS
Global Knowledge’s unrivalled cybersecurity learning portfolio is delivered across more modalities than any other provider in the world; this means that however you and your team prefer to learn, we have the solution. We will hold your hand through the learning assessment to ensure we provide you with the learning solutions that build fundamental to advanced cybersecurity techniques, prepare you for top industry-recognised certifications and master product-specific skills.
Global Knowledge have the learning solutions to equip organisations and individuals with the skills and capabilities they need to safeguard their data in the cloud and on-premises, reducing the risk of business interruption and data breaches. Our cybersecurity learning solutions encompass globally recognised accreditations covering generic policy, procedures, governance and protocols; which complement and dovetail into our library of technology provider learning solutions including, Microsoft and AWS.
www.globalknowledge.com
$ 4.24
89%
CLOUD CYBERSECURITY IS A TOP PRIORITY FOR ALL BUSINESS LEADERSAs Data Breaches Soar the Demand for Trained and Certified Cybersecurity Professionals Accelerates
The demand for skills development and training in the Cybersecurity space is monumental
The average cost of a data breach to organisations is at an all-time high at $4.24 million
IBM Annual Cost of Data Breach Report 2021
The global Cybersecurity workforce needs to grow by 89%
2020 ISC2 Survey
50% of businesses have basic cyber skill gaps which hinder or prevent them from carrying out the tasks laid out in the government-endorsed Cyber Essentials Scheme.
Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)
33% of businesses have skills gaps in penetration testing, forensic analysis and security architecture.
Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)
32% of businesses have skills gaps in incident response.
Cyber security skills in the UK labour market 2021 Findings Report - Department for Digital, Culture, Media & Sport (DCMS)
www.globalknowledge.com
2 CYBERSECURITY TECHNOLOGY
Technology:
Technology Solutions Training
•Amazon Web Services •Checkpoint •Cisco •Dell SonicWALL •F5 •IBM •Juniper •Microsoft •Palo Alto •Solar Winds
ProcessFrameworks •COBIT •COSO •CSIS •ISO27000 •NICE •NIST •OCTAVE
Governance and ComplianceStandards •HIPPA •PCI-DSS •ISO27001 •Sarbanes - Oxley
People:
Cybersecurity Awareness and Fundementals
Certification Prep/Bodies of Knowledge •CompTIA. •EC-Council •IAPP •ISACA •ISC2
www.globalknowledge.com
3 CYBERSECURITY TECHNOLOGY
CLOUD CYBERSECURITY IS A TOP PRIORITY FOR ALL BUSINESS LEADERS
People, Process and Technology
Cybersecurity is an obligation, not an option. It’s a shared responsibility, conceptually and in real world practice and it starts at the top with the CIO who needs to ensure the organisations security needs are prioritised and properly addressed. The make-up of the cybersecurity team, both technical and non-technical, will vary by organisation, but regardless of their capacity they will all require training. To close the loop it is essential that all device users receive training and guidance to protect their devices against the risk of a data breach.
Global Knowledge is uniquely placed to address the 3 pillars of cybersecurity – People , Process and Technology. Our ability to deliver across all three areas makes us unique in the marketplace.
GOVERNANCE, RISK & COMPLIANCE
Measures and quantifies risk, performs internal
audits against best practices and standards,
develops plans for business continuity and
disaster recovery
Job RolesGovernance, Risk and Compliance Officer
Risk Manager
Security Auditor
FORENSIC AND INCIDENT RESPONSE
Detect, analyse, contain, eradicate and recover from a security event
Job RolesSecurity Investigator
Data Forensic Analyst
Malware Researcher
ETHICAL HACKING & PENETRATION TESTING
Understand hacking methods, identify
vulnerabilities and fix them, before penetration
testing your network
Job RolesEthical / White Hat
Hacker
Pen Tester (Red Team)
Vulnerability Assessor
CYBERSECURITY OPERATIONS
Manages Identification, authorisation and
permissions across all systems and continually
monitors the security posture of the network
Job RolesSecurity Operations
Centre (SOC) Analyst / Manager
Cyber Operations Specialist
Intrusion Detection Analyst
INFORMATION SECURITY /
CYBERSECURITY MANAGEMENT
Designs and implements secure architectures, translates standards,
business processes and frameworks into internal
policies
Job RolesCloud Security Architect
Network Security Administrator
Business Continuity Manager
DATA PRIVACY
Define who has access to data and implement tools
and policies to provide data protection
Job Roles
Data Privacy Officer
Lead Privacy Manager
Security and Privacy Engineer
www.globalknowledge.com
4 CYBERSECURITY TECHNOLOGY
Cybersecurity teams are structured in various ways according to an organisations specific needs, but generally they are sub-divided into several functional areas or domains:-
CYBERSECURITY THREATS
SECURE CODING
Integrate secure coding practices into software development lifecyle
(SDLC) including application testing
Job Roles
Cybersecurity software Developer / Engineer
Application Developer
Source Code Auditor
CLOUD SECURITY
Policies, controls, procedures and
technologies that work together to protect
cloud-based systems
Job Roles
Cloud Architect
Cloud Security Analyst
Cloud Security Specialist
www.globalknowledge.com
5 CYBERSECURITY TECHNOLOGY
www.globalknowledge.com
6 CYBERSECURITY TECHNOLOGY
The cybersecurity roadmap below illustrates the Global Knowledge portfolio of cybersecurity courses by the domains described above and by levels of experience and expertise.
ETH
ICA
L H
AC
KIN
G
&
PEN
ETR
ATI
ON
TE
STIN
G
CY
BER
SEC
UR
ITY
O
PER
ATI
ON
S
INFO
RM
ATI
ON
SE
CU
RIT
Y /
C
YB
ERSE
CU
RIT
Y
MA
NA
GEM
ENT
GO
VER
NA
NC
E, R
ISK
&
CO
MPL
IAN
CE
FOR
ENSI
C A
ND
IN
CID
ENT
RES
PON
SE
DA
TA P
RIV
AC
Y
SEC
UR
E C
OD
ING
CLO
UD
SEC
UR
ITY
CPENT AMH CISSP CCISO CHFI CDPSE SCT CCSK
G015 CBR CISAU ISO27701 LA FOR CIPM CASE
PTCMW ECES GK2951 CGEIT AMH CIPPE
360PTC RBO CISMP ISO27001 LI ECIH CIPPE-CIPM
RBO CTIA SSCP CCAK CIPPE-CIPT
CTIA EC-CSA CSSLP CRISC CIPT-IAPP
CEH CySA+ CCSP SCT
CAP
ECES
CCAK
CISM
PKI
CND
9701
G013
CSCU
www.globalknowledge.com
7 CYBERSECURITY TECHNOLOGY
Global Knowledge are an EC-Council ATC within EMEA; continually delivering EC-Council accredited training to thousands of delegates across the entire portfolio of learning.
EC-Council courses are designed to help organisations and Individuals take pre-emptive measures against malicious attacks, by learning how to identify and defend the weaknesses in their own network.
Certified Security Computer User
Certified Network Defender
Certified Ethical Hacker Certified Penetration Tester
112-12 Exam 312-38 Exam 312-50 Exam
Certified Penetration Testing Professional
Exam
Certified Application Security Engineer . NET
Certified Application Security Engineer .
JAVACertified Threat
Intelligence AnalystEC Council Certified Encryption Specialist
Computer Hacking Forensic Investigator
Certified Application Security Engineer Exam 312-85 Exam ECES Exam 312-49 Exam
Certified Chief Information Security
OfficerCertified SOC Analyst EC Council Certified
Incident Handler
712-50 Exam 312-39 Exam 212-89 Exam
www.globalknowledge.com
8 CYBERSECURITY TECHNOLOGY
Global Knowledge are an Elite+ partner to ISACA and their largest partner in Europe. Our geographic footprint enables us to deliver ISACA knowledge, skills and accreditations across the globe.
ISACA’s globally recognised accreditations provide professionals with the skills to lead, adapt and assure trust in an evolving digital world, by offering access to innovative and world-class knowledge, standards, networking, credentialing and career development.
Once you have passed the certification exam you have 5 years in which to apply for the certification, you must have five or more years of professional experience in the relevant job practice areas.
Global Knowledge are the EMEA CompTIA Delivery Partner of the Year 2019, 2020 and 2021; and the only partner to have held this accolade for three years. Within this remit we deliver the most comprehensive and largest portfolio of CompTIA learning solutions and certifications; delivered in multiple modalities and time zones.
CompTIA’s vendor-neutral certifications are recognised worldwide. CompTIA’s portfolio aligns cybersecurity career paths, designed to take you from foundation to expert with each certification providing an additional depth of expertise.
CISA Exam CISM Exam CRISC Exam CGEIT Exam CDPSE Exam
CS0-001 Exam SY0-601 Exam PT0-001 Exam CAS-003 Exam
www.globalknowledge.com
9 CYBERSECURITY TECHNOLOGY
Global Knowledge are a trusted partner to (ISC)² and one of the go to market organisations for their training. Our ability to deliver in multiple languages makes us the go to provider for international organisations.
(ISC)² information security certifications are recognised as the global standard for excellence. Being certified means your organisation is better prepared to protect your critical information assets and infrastructures.
Certified Information Systems Security
Professional
Certified Cloud Security Professional
Certified Secure Software Lifecycle
Professional
Systems Security Certified Practitioner
Certified Authorisation Professional
CISSP Exam CCSP Exam CSSLP Exam SSCP Exam CAP Exam
CISCO
RED HAT
JUNIPER
PALO ALTO
Cloud Providers
InfrastructureProviders
MICROSOFT
AWS
IBM
www.globalknowledge.com
10 CYBERSECURITY TECHNOLOGY
To create a protective and secure network environment your cybersecurity learning strategy has to include the security elements specific to your network technologies and platforms. Our learning advisors will work with you to design a learning itinerary that meets the needs of your teams, the specifics of your network, your organisational goals and learning preferences. Here’s a taster of just some of the technologies in which we specialise:-
www.globalknowledge.com
11 CYBERSECURITY TECHNOLOGY
GK Polaris: Unlimited Training Subscriptions
GK Polaris Accelerate
Technology is constantly changing, and the role of IT professionals is continually evolving. Continuous learning is the key to keeping your skills current and ensuring you have what it takes to rise to the digital transformation challenge.
GK Polaris provides three subscription options. The Discovery plan includes 200+ live virtual courses. The Accelerate plan consists of hundreds of authorised on-demand courses with related challenge-based activities. The Launch plan delivers 200+ on-demand courses.
GK Polaris Accelerate is designed to develop and reinforce the competencies IT professionals need on the job. This is enabled by unlimited access to over 18,000 hours of vendor-authorised and industry-validated on-demand courses, certification prep, practice exams, labs, learning paths and more. Topics include: AWS, CompTia, EC-Council, Google Cloud, Linux, Microsoft, Cloud, Cybersecurity, Data Science, Leadership, Programming, Project Management, Networking and more.
•Access to hundreds of hands-on exercises, challenges and monthly CyberQ Cyber Ranges.•8,000+ hours of on-demand courses, 10,000 digital books, 1,400 hours of labs and 2,600+ hours of exam prep in Percipio, Skillsoft’s cutting-edge learning platform.•Aspire learning journeys that provide clear development paths for critical job roles.•Short, live-streamed bootcamps in subjects such as AWS, Microsoft, cybersecurity and programming.•Coding sandboxes to practice in non-production environments.•Live mentors through chat or email.
GK PolarisA robust cybersecurity strategy requires a long-term, agile commitment to continuing education. GK Polaris Accelerate provides the perfect vehicle to ensure your teams have access to the training they need to develop, evolve and continually test their skills.
Global Knowledge/Skillsoft has an unrivalled global reach serving approximately 70% of the fortune 1000 customers in over 160 countries and more than 45 million learners globally
•Interact face-to-face with subject matter experts.•Work on state-of-the-art equipment in a ready-to-learn environment.•Training locations located around the world.
•Convenient 24/7 access to instructor-led videos and hands-on activities.•Learn at your own pace and on any device.
•Experience live instructor-led online training from the location of your choice.•Participate in exercises and collaborate with peers.
•Exam readiness courses.•One-day condensed workshop.•Get ready by covering exam topics / sample questions.
•Experience live instructor-led online training from the location of your choice.•Participate in exercises and collaborate with peers.
Our IT training subscriptions feature on-demand learning from leading technology providers like AWS, Cisco, Microsoft and Red Hat. Through combinations of on-demand content, instructor-led videos, hands-on labs and IT certification training, you’ll build new skills and keep your current skills razor sharp. Best of all, you’ll have instant access to your online IT training, whenever you need it—for a full year.
CLASSROOM LIVE
ON-DEMAND
VIRTUAL CLASSROOM LIVE
EXAM PREPARATION
PRIVATE COMPANY TRAINING
UNLIMITED TRAINING SUBSCRIPTIONS
www.globalknowledge.com
12 CYBERSECURITY TECHNOLOGY
Plan Your Training:Whether instructor-led or self-paced, in our classroom, at your company or online, our convenient delivery formats enable you and your team to get the training you need, where, when and how you want it.